Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 13:55
Behavioral task
behavioral1
Sample
JaffaCakes118_ed2de70e556ff5f307ac2c7e2a5b354457bd3fa77c814bb7d422ad48e252201a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ed2de70e556ff5f307ac2c7e2a5b354457bd3fa77c814bb7d422ad48e252201a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ed2de70e556ff5f307ac2c7e2a5b354457bd3fa77c814bb7d422ad48e252201a.exe
-
Size
1.3MB
-
MD5
22820d31527ca42dd7442c8c5bb7d86d
-
SHA1
a1ff80482a6f29d43771efc245ea4c42e779c503
-
SHA256
ed2de70e556ff5f307ac2c7e2a5b354457bd3fa77c814bb7d422ad48e252201a
-
SHA512
8dfe20595cdd0c73bbaf6678a23679aaab2f1d3e5a63da20d60e09d45752055963002c40bd8fc3e1c8f978604edf18d55389f4042a2f15f28d354799880e794c
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 57 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2712 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2436 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2708 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2600 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2648 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3048 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2480 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1480 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1976 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3060 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 320 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1648 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2940 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1788 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2340 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1792 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3012 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1548 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1756 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 852 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2404 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2396 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2120 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 792 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2492 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1984 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2784 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1544 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 612 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1820 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 296 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1732 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1696 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 904 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2488 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2420 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2904 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1512 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2964 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 884 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2676 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1604 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2272 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3008 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2516 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2384 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2408 2816 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2192 2816 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x0008000000015d59-9.dat dcrat behavioral1/memory/1832-13-0x0000000000070000-0x0000000000180000-memory.dmp dcrat behavioral1/memory/1632-158-0x0000000000B00000-0x0000000000C10000-memory.dmp dcrat behavioral1/memory/1764-217-0x00000000010A0000-0x00000000011B0000-memory.dmp dcrat behavioral1/memory/484-277-0x0000000001130000-0x0000000001240000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 20 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2880 powershell.exe 496 powershell.exe 2840 powershell.exe 1228 powershell.exe 2616 powershell.exe 2624 powershell.exe 3056 powershell.exe 1532 powershell.exe 2608 powershell.exe 2972 powershell.exe 2720 powershell.exe 2832 powershell.exe 2804 powershell.exe 1356 powershell.exe 1496 powershell.exe 2632 powershell.exe 2712 powershell.exe 2812 powershell.exe 2084 powershell.exe 3040 powershell.exe -
Executes dropped EXE 12 IoCs
pid Process 1832 DllCommonsvc.exe 1632 csrss.exe 1764 csrss.exe 484 csrss.exe 1328 csrss.exe 2328 csrss.exe 2876 csrss.exe 2492 csrss.exe 2788 csrss.exe 2376 csrss.exe 2036 csrss.exe 2636 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 2932 cmd.exe 2932 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 9 raw.githubusercontent.com 4 raw.githubusercontent.com 12 raw.githubusercontent.com 16 raw.githubusercontent.com 20 raw.githubusercontent.com 24 raw.githubusercontent.com 27 raw.githubusercontent.com 31 raw.githubusercontent.com 34 raw.githubusercontent.com 5 raw.githubusercontent.com 38 raw.githubusercontent.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\0409\sppsvc.exe DllCommonsvc.exe File created C:\Windows\System32\0409\0a1fd5f707cd16 DllCommonsvc.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\69ddcba757bf72 DllCommonsvc.exe File created C:\Program Files\Windows NT\TableTextService\6cb0b6c459d5d3 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\audiodg.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\42af1c969fbb7b DllCommonsvc.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\explorer.exe DllCommonsvc.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7a0fd90576e088 DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\smss.exe DllCommonsvc.exe File created C:\Program Files\Windows NT\TableTextService\dwm.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\csrss.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\886983d96e3d3e DllCommonsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Performance\WinSAT\DataStore\explorer.exe DllCommonsvc.exe File created C:\Windows\Performance\WinSAT\DataStore\7a0fd90576e088 DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ed2de70e556ff5f307ac2c7e2a5b354457bd3fa77c814bb7d422ad48e252201a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 57 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1820 schtasks.exe 2192 schtasks.exe 1792 schtasks.exe 2120 schtasks.exe 2384 schtasks.exe 2408 schtasks.exe 1480 schtasks.exe 2492 schtasks.exe 1696 schtasks.exe 2272 schtasks.exe 2344 schtasks.exe 296 schtasks.exe 1732 schtasks.exe 2128 schtasks.exe 1632 schtasks.exe 1604 schtasks.exe 2340 schtasks.exe 3012 schtasks.exe 2404 schtasks.exe 1512 schtasks.exe 2620 schtasks.exe 2664 schtasks.exe 2088 schtasks.exe 612 schtasks.exe 884 schtasks.exe 2712 schtasks.exe 852 schtasks.exe 1544 schtasks.exe 3060 schtasks.exe 320 schtasks.exe 1788 schtasks.exe 2396 schtasks.exe 3008 schtasks.exe 2708 schtasks.exe 2648 schtasks.exe 2480 schtasks.exe 1976 schtasks.exe 2420 schtasks.exe 3048 schtasks.exe 1648 schtasks.exe 792 schtasks.exe 1328 schtasks.exe 2676 schtasks.exe 2516 schtasks.exe 904 schtasks.exe 2512 schtasks.exe 2940 schtasks.exe 1548 schtasks.exe 2904 schtasks.exe 1756 schtasks.exe 1984 schtasks.exe 2784 schtasks.exe 2436 schtasks.exe 2600 schtasks.exe 1972 schtasks.exe 2488 schtasks.exe 2964 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 1832 DllCommonsvc.exe 1832 DllCommonsvc.exe 1832 DllCommonsvc.exe 1832 DllCommonsvc.exe 1832 DllCommonsvc.exe 1832 DllCommonsvc.exe 1832 DllCommonsvc.exe 3040 powershell.exe 2804 powershell.exe 2616 powershell.exe 2840 powershell.exe 1356 powershell.exe 2972 powershell.exe 2812 powershell.exe 2608 powershell.exe 2720 powershell.exe 2632 powershell.exe 496 powershell.exe 1228 powershell.exe 1532 powershell.exe 1496 powershell.exe 2624 powershell.exe 2712 powershell.exe 3056 powershell.exe 2880 powershell.exe 2084 powershell.exe 2832 powershell.exe 1632 csrss.exe 1764 csrss.exe 484 csrss.exe 1328 csrss.exe 2328 csrss.exe 2876 csrss.exe 2492 csrss.exe 2788 csrss.exe 2376 csrss.exe 2036 csrss.exe 2636 csrss.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeDebugPrivilege 1832 DllCommonsvc.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 3040 powershell.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 1356 powershell.exe Token: SeDebugPrivilege 2972 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 2632 powershell.exe Token: SeDebugPrivilege 496 powershell.exe Token: SeDebugPrivilege 1228 powershell.exe Token: SeDebugPrivilege 1532 powershell.exe Token: SeDebugPrivilege 1496 powershell.exe Token: SeDebugPrivilege 2624 powershell.exe Token: SeDebugPrivilege 2712 powershell.exe Token: SeDebugPrivilege 3056 powershell.exe Token: SeDebugPrivilege 2880 powershell.exe Token: SeDebugPrivilege 2084 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 1632 csrss.exe Token: SeDebugPrivilege 1764 csrss.exe Token: SeDebugPrivilege 484 csrss.exe Token: SeDebugPrivilege 1328 csrss.exe Token: SeDebugPrivilege 2328 csrss.exe Token: SeDebugPrivilege 2876 csrss.exe Token: SeDebugPrivilege 2492 csrss.exe Token: SeDebugPrivilege 2788 csrss.exe Token: SeDebugPrivilege 2376 csrss.exe Token: SeDebugPrivilege 2036 csrss.exe Token: SeDebugPrivilege 2636 csrss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2508 2516 JaffaCakes118_ed2de70e556ff5f307ac2c7e2a5b354457bd3fa77c814bb7d422ad48e252201a.exe 30 PID 2516 wrote to memory of 2508 2516 JaffaCakes118_ed2de70e556ff5f307ac2c7e2a5b354457bd3fa77c814bb7d422ad48e252201a.exe 30 PID 2516 wrote to memory of 2508 2516 JaffaCakes118_ed2de70e556ff5f307ac2c7e2a5b354457bd3fa77c814bb7d422ad48e252201a.exe 30 PID 2516 wrote to memory of 2508 2516 JaffaCakes118_ed2de70e556ff5f307ac2c7e2a5b354457bd3fa77c814bb7d422ad48e252201a.exe 30 PID 2508 wrote to memory of 2932 2508 WScript.exe 31 PID 2508 wrote to memory of 2932 2508 WScript.exe 31 PID 2508 wrote to memory of 2932 2508 WScript.exe 31 PID 2508 wrote to memory of 2932 2508 WScript.exe 31 PID 2932 wrote to memory of 1832 2932 cmd.exe 33 PID 2932 wrote to memory of 1832 2932 cmd.exe 33 PID 2932 wrote to memory of 1832 2932 cmd.exe 33 PID 2932 wrote to memory of 1832 2932 cmd.exe 33 PID 1832 wrote to memory of 2840 1832 DllCommonsvc.exe 92 PID 1832 wrote to memory of 2840 1832 DllCommonsvc.exe 92 PID 1832 wrote to memory of 2840 1832 DllCommonsvc.exe 92 PID 1832 wrote to memory of 2972 1832 DllCommonsvc.exe 93 PID 1832 wrote to memory of 2972 1832 DllCommonsvc.exe 93 PID 1832 wrote to memory of 2972 1832 DllCommonsvc.exe 93 PID 1832 wrote to memory of 2804 1832 DllCommonsvc.exe 94 PID 1832 wrote to memory of 2804 1832 DllCommonsvc.exe 94 PID 1832 wrote to memory of 2804 1832 DllCommonsvc.exe 94 PID 1832 wrote to memory of 2720 1832 DllCommonsvc.exe 95 PID 1832 wrote to memory of 2720 1832 DllCommonsvc.exe 95 PID 1832 wrote to memory of 2720 1832 DllCommonsvc.exe 95 PID 1832 wrote to memory of 2832 1832 DllCommonsvc.exe 96 PID 1832 wrote to memory of 2832 1832 DllCommonsvc.exe 96 PID 1832 wrote to memory of 2832 1832 DllCommonsvc.exe 96 PID 1832 wrote to memory of 2624 1832 DllCommonsvc.exe 97 PID 1832 wrote to memory of 2624 1832 DllCommonsvc.exe 97 PID 1832 wrote to memory of 2624 1832 DllCommonsvc.exe 97 PID 1832 wrote to memory of 1228 1832 DllCommonsvc.exe 98 PID 1832 wrote to memory of 1228 1832 DllCommonsvc.exe 98 PID 1832 wrote to memory of 1228 1832 DllCommonsvc.exe 98 PID 1832 wrote to memory of 2812 1832 DllCommonsvc.exe 99 PID 1832 wrote to memory of 2812 1832 DllCommonsvc.exe 99 PID 1832 wrote to memory of 2812 1832 DllCommonsvc.exe 99 PID 1832 wrote to memory of 1356 1832 DllCommonsvc.exe 100 PID 1832 wrote to memory of 1356 1832 DllCommonsvc.exe 100 PID 1832 wrote to memory of 1356 1832 DllCommonsvc.exe 100 PID 1832 wrote to memory of 2616 1832 DllCommonsvc.exe 101 PID 1832 wrote to memory of 2616 1832 DllCommonsvc.exe 101 PID 1832 wrote to memory of 2616 1832 DllCommonsvc.exe 101 PID 1832 wrote to memory of 2084 1832 DllCommonsvc.exe 102 PID 1832 wrote to memory of 2084 1832 DllCommonsvc.exe 102 PID 1832 wrote to memory of 2084 1832 DllCommonsvc.exe 102 PID 1832 wrote to memory of 3040 1832 DllCommonsvc.exe 103 PID 1832 wrote to memory of 3040 1832 DllCommonsvc.exe 103 PID 1832 wrote to memory of 3040 1832 DllCommonsvc.exe 103 PID 1832 wrote to memory of 2880 1832 DllCommonsvc.exe 104 PID 1832 wrote to memory of 2880 1832 DllCommonsvc.exe 104 PID 1832 wrote to memory of 2880 1832 DllCommonsvc.exe 104 PID 1832 wrote to memory of 2632 1832 DllCommonsvc.exe 105 PID 1832 wrote to memory of 2632 1832 DllCommonsvc.exe 105 PID 1832 wrote to memory of 2632 1832 DllCommonsvc.exe 105 PID 1832 wrote to memory of 2712 1832 DllCommonsvc.exe 106 PID 1832 wrote to memory of 2712 1832 DllCommonsvc.exe 106 PID 1832 wrote to memory of 2712 1832 DllCommonsvc.exe 106 PID 1832 wrote to memory of 3056 1832 DllCommonsvc.exe 107 PID 1832 wrote to memory of 3056 1832 DllCommonsvc.exe 107 PID 1832 wrote to memory of 3056 1832 DllCommonsvc.exe 107 PID 1832 wrote to memory of 1532 1832 DllCommonsvc.exe 108 PID 1832 wrote to memory of 1532 1832 DllCommonsvc.exe 108 PID 1832 wrote to memory of 1532 1832 DllCommonsvc.exe 108 PID 1832 wrote to memory of 496 1832 DllCommonsvc.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ed2de70e556ff5f307ac2c7e2a5b354457bd3fa77c814bb7d422ad48e252201a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ed2de70e556ff5f307ac2c7e2a5b354457bd3fa77c814bb7d422ad48e252201a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\OSPPSVC.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\0409\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Performance\WinSAT\DataStore\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows NT\TableTextService\dwm.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Downloads\lsass.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\sppsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\smss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\WmiPrvSE.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\csrss.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\audiodg.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\explorer.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\DllCommonsvc.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Videos\Sample Videos\cmd.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CKpKWJybko.bat"5⤵PID:2104
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2580
-
-
C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\K3fI8Bd254.bat"7⤵PID:1680
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:1972
-
-
C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1764 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cYhs0sn2L6.bat"9⤵PID:2124
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:2876
-
-
C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:484 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\X8VSEkwS9E.bat"11⤵PID:1016
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:2668
-
-
C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\raSqT8qddO.bat"13⤵PID:2420
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵PID:2412
-
-
C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\oYNvu0ZNBR.bat"15⤵PID:1544
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:216⤵PID:1792
-
-
C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CPbxFudqw6.bat"17⤵PID:1480
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:218⤵PID:304
-
-
C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rjTee716Rl.bat"19⤵PID:320
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:220⤵PID:2988
-
-
C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6SU00hIhBO.bat"21⤵PID:1188
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:222⤵PID:2752
-
-
C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zGIMjSYhT8.bat"23⤵PID:1212
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:224⤵PID:2488
-
-
C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OyPKZ08zKl.bat"25⤵PID:2072
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:2692
-
-
C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe"26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2712
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2436
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 7 /tr "'C:\providercommon\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\providercommon\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 6 /tr "'C:\providercommon\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Windows\System32\0409\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\System32\0409\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 13 /tr "'C:\Windows\System32\0409\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3060
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Windows\Performance\WinSAT\DataStore\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\DataStore\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Windows\Performance\WinSAT\DataStore\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows NT\TableTextService\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Windows NT\TableTextService\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows NT\TableTextService\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1548
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Downloads\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Public\Downloads\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Downloads\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\providercommon\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\providercommon\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2120
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2492
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1544
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Users\Public\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\Public\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 7 /tr "'C:\Users\Public\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2420
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Sidebar\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2904
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2964
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 10 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:884
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 10 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\DllCommonsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 9 /tr "'C:\Recovery\18fc4542-69f6-11ef-a46c-62cb582c238c\DllCommonsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Videos\Sample Videos\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2384
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Users\Public\Videos\Sample Videos\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2408
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Videos\Sample Videos\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585bc05c53c387d38f01898b638bb564a
SHA13cb8624219423fb8d6e6a97c811f6b9a06b3a4d1
SHA256e6b5840950298cf460bd531f31f23a9d2e5a57557952d53472a523f05bad653e
SHA512ec90be2de2c2bcddf9aba654d929be9c889f1075c02e4e7aa1fe3dd52d20647e8f589e45b6f9a48e51ed64b6e3450c4c44b9a16801b0d9ee6f80f4a381299ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e35ec26eae17775bc6f6a265ee915dfb
SHA1e5e141e31152b11cf9046080e1baaae3583cef28
SHA2565f11ecb8874376a58ddfc614601c9a49275289d47ff4a09a0d9f1be2fc297027
SHA512f1e1adf162a6442472623d75c1a20f3b7a3038a72a3ed7b924bae8dddb907bd2e171266b9915a00716fe384507edb60dc58921a53dca9fb3b7af6228b81405d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54367708d04fa4113fc78bc0dac843853
SHA13df6a6904ac8282260e94f08e01ee31f8a5927c9
SHA256871d7d9148ede72b78026904b2446edc3c2d151e9d4b302f1264dbdda2bc0305
SHA512422a121f2f8696aef62d62d25b0dbf32781ebeb3b51e3af6027a2ea64b89f2d2a24a81ce1298e8f220a131f2a36c4b6337f6d592a23ecfef342a540fb7277a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d176cab19c72b2625020a30c78d91abf
SHA1655cc0f415da548536f9b2bdd0da0929156ee2b9
SHA2564814bea2da5fe1ba78496b2ccd29756173b91488265b020e69f85c15b587e3ed
SHA512a4d52518bfa9c47de7f325ff80411e515a2232ac4d37a48c5630f565de6eb662c878a56d68694980105ad29196e3bde566cc1ae1fbd0e61396e85f3b309995ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c029ebc3da7aed4b84308cb600cc0de
SHA103794fba640026f428ef144b9cf57ea08f3e0908
SHA2568158bc8b827e705510bed684b07c643bd4d8ce8eddfbdda5d6cfd9c4729bdf73
SHA5123b9396e012ab27d4fd6ea348475f5c4b9b315daf2ac3fc319350a459584eee989f4e257688577c5584c4d1136055efdc9f448663f9631c0fd6f7179e71b93c89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab65cd921121c36a46c73ee2bf25950e
SHA1d7b43ccaed4a62bd5538e8f05fe48c9f007d9969
SHA25687317171419eddfe30a6529f5d8a861561fe739b874013a329a3ed6e51a9f73f
SHA512d4f2ea0f70dd2a403bb25f20d0c200ae472adb242657e650a0442a02f129654e76d51a6f8500f0ff82ff70adcf396a2bbc0695374d5d050fd675b3bade16d89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a21efe0d8427be6cf8d8832119eb8532
SHA108b1192e6777692cfd0c6fbcc9cd02c448522daf
SHA256d40f38db5cdebe35994cb61d1fcf9b2597c9a8096f8e78d14ad98071b703812a
SHA51259b3c7c9f8c9446dad04794c85d29b905b85c2c262d3299a1a91a0679ef91b9fd161b0cb4a5f4a8c51bc9fd9e7661abaad8dbf15981e178aafaeb7ff79143927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a89a480f7c81d3ab4887c7263fc8510
SHA1a373c54fcfbf933b91ebb77309593c2886a65dc0
SHA2565348acc24636ed382bfea61193509404ff63b4e28bc020cfae53fa64fe9b45db
SHA51228e79249b2a9a85f6fdab2b7a01b5034e28c7d8c61143f4f2a20fb1bfacd996a50c34fb0b479e8089c278988c79ef366de8bfa7e8fa43dba48c807d23de3536e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5487a3d2858371311f217083310d6cf27
SHA16c7b8708698ca55aeec9c84947a9bdfd682a8907
SHA25692eab4ceb632acdd86c9e8cbfca46decb311c7a59ddde3ae03db484d6e1468d4
SHA512d0aaa3338ce83345900a0425be97a8164f50d374bdb62e5b6f108d2b3b1495e00c70ef167c9bc6ee06ca31e14eb2c7c82bb600e5eba9f70c4db8b83fbac5d188
-
Filesize
223B
MD5d41a3e67c7efca90f219966c77656b08
SHA17a7a4afcb35c19ce9fe7d7b039e327551c2aa77a
SHA25634e4444edcc8edb9929ec4f9469615dd6ed865ec015a9fdb44248a380e9b30eb
SHA512879f1bfd9b62a2e544ee04ec9e9c4b97cf1ae023b4bda8c0cefc9b73621f316e3e345e6a792c49361d6f86e93fb4be9c7b609e4d4b571ba9bcf70317e64088d6
-
Filesize
223B
MD53fbe5a5a7f01807f5854f9e9f64cb565
SHA125d2120db766b0ec14cc81e6b79b01787b7ef4f9
SHA256a54e6c6c5c02fb5e48aa81cbb79590f797df70b116ce797930e931a4ad2eda76
SHA51294686e7a993897d6bb916bbd023cce395570e7ffa827c95703945e63453a21ccc657a88669a71d306704305cf70a5ddfc69e7be6ec6ea657b670fe27be1c928b
-
Filesize
223B
MD58a23656b373f8f2fd94ef8cf2f1c5ed2
SHA10850fcb62826888da2b353e9949e92978f06334e
SHA25660d88c537b0e324e433ea582a7ebde63c2c6e16d8c4dc6f4533309adcbbdbe49
SHA5124b1aa4d17c1ad99460eb9f772f50264eac3fb172738d3464f1bf5bae6702b53df9a11d612c6a8562bc99ebb73d014477476b0c7f8802c419f184a3988bf5d4c0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
223B
MD56f0d30aed8689c0b527851e76be4bc4a
SHA10667cad1f061c4927ac67bc69bfd946cc201ada1
SHA256b0a2eab6796231c441b6a5d3382ee64517cbbbc3c8cad1d90e4ed2a23433b6d2
SHA512b0c26e7322a2871d209b03fa0b3f2e5f79e0e34c96f24499c5da759046cfcfab64c3bb91446f5544e675edbfd6d931f0f91188b81ddf5fae1659fbae1a00488b
-
Filesize
223B
MD5e6aa80b4c7e311a5a1a34f05640a5b28
SHA191ad47a44b69783adadf5cc446da53923d381f52
SHA256f9b339fac21e36238f1d0219c29e341eaa921033cde91ce2c5a318433b2b5d25
SHA512ab736556f33f38cb0ad9f000d2cd84881eaee50aa30e4aec3da55b6592c8970444476c6ec588c9d8ea288cdc6aaa2f4fc6ce0b2a4358345ded2fa5708ed004ed
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
223B
MD5359585a0ca26786a19925b5330aab0a9
SHA17f10f39f23fe9026b84a072494e37fde19eec9b8
SHA256f631aa3179ad7b4999e506c1a56bee1ab4077bfb059513228469fa2e95989d8b
SHA512587a22448397fb4f835defe576944a3e37ed8f22c67e2c5d0788ec74dc4d4047338be6636155dd9efaeafe026cc69794a117904881fc405bf24a82b2c2cec081
-
Filesize
223B
MD5b71fea7fc3b5568f3ec75cbd75f45ef0
SHA1fa70114fbc89f480ec84133f779bbce8ee1ea1a0
SHA2560df0ac0f9bb8ec244303d4d9395a5c915f8123df9992c47fcc80681bd138764f
SHA512e47f2d7a20f0403f5fdfe30e45353642ad6b1ec5fdacaafa91d2c74a8c6bef3e06135210bac2f8aac94a29e8192fc81dd41b196cc5ba781359bb97e114de203d
-
Filesize
223B
MD5da4731b2d79d0b9c682125fe56423f52
SHA1dcd387e77c99ebe8fca615ac239dc6b325144273
SHA2560524f3241e4e7f3ac3129c8d28620de815c2552ba736f192c690159a78c4e75a
SHA512797ddb10bd0f4511200769762296fa0904acd9fd2e2c409029db19bbd156a00892a75a1d03c98660e03315a6d391a191ee9f44eee44e6866d2903a334e93989e
-
Filesize
223B
MD5fee9762c619a8dabaf9378176ddbb4bd
SHA11e84c1469db85720f186fcf8862b167b397cb4d5
SHA256e88b6229e15b0f11aebf48265996ed3933610561cb28b608a100ab16e01cdf47
SHA5128c43a38d761f7ce36589f6c81fff216e3dd51be72e0127923930b4b3d784138f2285a36d5ab352a3b8e81dad93e1e6a6c3b80de553d629189bfc4a80c47e596b
-
Filesize
223B
MD59db8f40d6ce7e9f8a15033bb180123a1
SHA1fd257ca93c4f8564e4592b8f56a30e12f9c0b59f
SHA256b386e1afab96d4488b5524a987386308a0b1b33b9101ac3df71a123caf36eb80
SHA512ba4ff5d4820c343a9cdc3b5c6d11b66c3fcf54fee783840d7ceff470aa82c504d230cccd2740b2bd7f5f0b90f4ef00c89f940f89ef40c0fc6630907eefeaeea2
-
Filesize
223B
MD5dea10ee443f404fb74b95958632b6d75
SHA132ca7e12954d1b5a66d50258327635c162bab8be
SHA256a12762901a9571d4ab2f257d2f7ecc6d5464df3446fce4f201d6df430069aba4
SHA5120110283fff8d0ad43e2ede927594bf0a50caf307e136c376d58f2f409299f726f20ec617cbefeb1135827ab3ed9df841acbd4eac43faab981acda759aa745eb2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53d5b5952ed867e674481937dbcec0748
SHA1f4d05b02801e0dfd3f3c0dbbbdff6249b94a4f78
SHA25606ff09466408f77fb0ec5c857f818280a7327ad59d3dc07d285b660cd9263b6c
SHA512512aa7108c4b3f55cec87b1752262871aaadf2630496d276dd0dfe9a65bda082f097935dc230cafd6b7343210b093e5f3b5bfca3dc5bd495d1dfca10ae486d77
-
Filesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
Filesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
Filesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394